{"id":20308,"date":"2024-11-29T10:53:02","date_gmt":"2024-11-29T15:53:02","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=20308"},"modified":"2024-11-28T00:22:27","modified_gmt":"2024-11-28T05:22:27","slug":"vulnerability-assessments","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/security\/vulnerability-assessments\/","title":{"rendered":"How vulnerability assessments benefit MSP clients"},"content":{"rendered":"<p>Security is essential for everyone, no matter which department a person works in, how big or small the company is, or what industry the organization belongs to. Sensitive data is sensitive data. That gives managed service providers (MSPs) an easy opening to initiate conversations with customers about routine security checks. As their trusted security advisor, MSPs are also perfectly positioned to evaluate clients\u2019 security posture and offer <a href=\"https:\/\/www.sherweb.com\/security\/\">solutions to help improve it<\/a>. Vulnerability assessments are an excellent place to start this process.<\/p>\n<h2>What are vulnerability assessments?<\/h2>\n<p>A vulnerability assessment is a method of identifying security weaknesses in a given IT environment. The process could apply to specific applications, solutions, networks, an entire IT infrastructure or a combination of all these elements. The results of a vulnerability assessment inform an organization and\/or IT provider about risk areas that should be addressed and prioritized according to their respective risk level, and typically provide paths to remediation.<\/p>\n<p>It&#8217;s not exactly rocket science to figure out why vulnerability assessments are important. If you\u2019re not on the lookout for areas where you might be open to a <a href=\"https:\/\/www.sherweb.com\/blog\/security\/top-cyber-threats\/\">security breach or attack<\/a>, you\u2019re more or less rendering yourself defenseless against malicious intent, which could result in disaster.<\/p>\n<p>Assessments aren\u2019t static. Threats come and go and evolve as new security measures appear, or as new tools arrive on the market. Because of this, MSPs offering vulnerability assessments should conduct them continually to ensure client environments stay as secure as possible. By doing this, MSPs can also build stronger relationships with customers by bringing new or changing vulnerabilities to their attention when they arise.<\/p>\n<h3>Types of vulnerability assessments<\/h3>\n<p>Because there are so many moving pieces within an organization, there\u2019s more than one way to determine whether a company\u2019s infrastructure and processes are at risk of losing valuable data and assets. The process for each security test is to identify the problem, evaluate the systems and processes in the environment, mitigate risks, and then create a prevention plan.<\/p>\n<p>As mentioned above, individual vulnerability assessments could be conducted on <strong>applications<\/strong>, <strong>networks<\/strong> or <strong>databases<\/strong>. An MSP could also assess the security of <strong>physical IT assets<\/strong> such as computers, hard drives, IoT devices or on-premises servers. The efficacy of <strong>internal security policies<\/strong> could be assessed for security vulnerabilities as well. For example, a company might not have adequate safeguards in place for educating employees about <a href=\"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/\">social engineering schemes<\/a> or the proper handling of sensitive information, which could leave them open to attack just as easily as unpatched software.<\/p>\n<h2>Benefits of vulnerability assessments for MSP clients<\/h2>\n<h3>Mitigating risk and improving security posture<\/h3>\n<p>One of the main selling points for an MSP performing these security checks is the ability to mitigate risk for customers. These assessments uncover risks that wouldn\u2019t have been noticed otherwise. To better understand their customer\u2019s environment, MSPs will usually test each system\u2019s capabilities and note shortcomings. After testing, they\u2019re able to do a few things. First, they provide insights to leaders as well as users on what is problematic. Second, they can decide what the best mitigation strategy is to implement to create a more healthy, safe environment.<\/p>\n<h3>Compliance<\/h3>\n<p>Ensuring compliance from an industry standpoint is another benefit of vulnerability assessments for MSP clients. Depending on the industry, there may be just one or a few compliance standards that an organization needs to adhere to. Examples include the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA) and the California Consumer Privacy Act (CCPA), just to name a few. A security assessment can flag when there\u2019s something amiss with an organization\u2019s security settings that may affect compliance. Identifying such issues is undoubtedly helpful, as it ensures business data can remain safe in both an operational and legal standing.<\/p>\n<h3>Cost savings<\/h3>\n<p>According to IBM\u2019s 2024 <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">Cost of a Data Breach Report<\/a>, the average cost of a breach is currently $4.88 million\u2014a devastating sum for many businesses. While implementing proper cybersecurity solutions and procedures are an obvious first line of defense against breaches and attacks, regular assessments of those systems help to ensure they\u2019re working as intended and prevent any gaps from forming before they can be taken advantage of. Beyond the extreme of a costly data breach, however, a vulnerability assessment\u2019s ability to pinpoint risks for potential data loss due to human error or an out-of-date solution can also result in cost savings MSP clients will appreciate.<\/p>\n<h2>Looking to offer vulnerability assessments to clients? Start with Microsoft 365<\/h2>\n<p>The benefits of offering vulnerability assessments to your MSP\u2019s clients are clear, but knowing exactly where to start might be a murkier subject. When in doubt, the low-hanging fruit is never a bad option.<\/p>\n<p>Not only is <a href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\">Microsoft 365<\/a> a solution suite that many MSPs already offer and that millions of businesses already use, it\u2019s also a magnet for cybercrime. More than <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/10\/15\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/\">600 million attacks<\/a> target Microsoft customers every day, and tech scams have increased by 400% since 2022. Any MSP managing Microsoft 365 licenses and environments for clients would therefore be well advised to make this area their launchpad for offering vulnerability assessments.<\/p>\n<p><a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\">Office Protect<\/a> makes this very easy to accomplish. Designed to monitor and protect Microsoft 365, the solution also equips MSPs with a simple yet effective <a href=\"https:\/\/scan.office-protect.com\/\">security assessment<\/a> that scans a client\u2019s security settings and configurations to determine whether their environment is on par with expert recommendations. From there, your MSP can take necessary action to remediate any vulnerabilities the assessment identifies. Try it out!<br \/>\n&nbsp;<\/p>\n<p style=\"text-align: center;\"><a class=\"my-button\" href=\"https:\/\/scan.office-protect.com\/\">Try our Office Protect Security Assessment<\/a><\/p>\n<style>\n  <!--a.my-button{ background-color: #ed573c; color: #fff; font-family: Tahoma; font-size: 15px; font-weight: 800; font-style: normal; text-decoration: none; padding: 14px 15px; border: 0px solid #000; border-radius: 10px; display: inline-block; box-shadow: 0px 0px 10px 0px #2D2D2D; } a.my-button:hover{ background-color: #ef7363; } a.my-button:active{ transform: scale(0.95); }--><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><br \/><\/style>\n<p>&nbsp;<\/p>\n<h2>Deliver comprehensive cybersecurity for your MSP clients with an experienced partner<\/h2>\n<p>As an experienced Microsoft cloud solution provider, Sherweb understands the intricacies of delivering quality services for MSPs and their clients, cybersecurity included. Our experts can help your MSP business with a lot more than making vulnerability assessments a profitable piece of your offering! Reach out to us today to <a href=\"https:\/\/info.sherweb.com\/sherweb-cloud-services-for-msps\" class=\"track-link\">start a conversation<\/a>, or check out our <a href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\" class=\"track-link\">partner guide<\/a> for more information about how we can help your business grow.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability assessment is a method of identifying security weaknesses in a given IT environme","protected":false},"author":177,"featured_media":20314,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[826,919,942],"class_list":["post-20308","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-office-protect","tag-cybersecurity","tag-managed-service-providers-msps"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How vulnerability assessments benefit MSP clients<\/title>\n<meta name=\"description\" content=\"Vulnerability assessments are a great tool for improving clients&#039; security posture and adding value to your cybersecurity offering.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How vulnerability assessments benefit MSP clients\" \/>\n<meta property=\"og:description\" content=\"Vulnerability assessments are a great tool for improving clients&#039; security posture and adding value to your cybersecurity offering.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-29T15:53:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/security-assessment-1200x630.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"How vulnerability assessments benefit MSP clients\",\"datePublished\":\"2024-11-29T15:53:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/\"},\"wordCount\":1014,\"commentCount\":3,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/security-assessment-1200x480.png\",\"keywords\":[\"Office Protect\",\"Cybersecurity\",\"Managed Service Providers (MSPs)\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/\",\"name\":\"How vulnerability assessments benefit MSP clients\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/security-assessment-1200x480.png\",\"datePublished\":\"2024-11-29T15:53:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Vulnerability assessments are a great tool for improving clients' security posture and adding value to your cybersecurity offering.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/security-assessment-1200x480.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/security-assessment-1200x480.png\",\"width\":1200,\"height\":460,\"caption\":\"Vulnerability assessment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/vulnerability-assessments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How vulnerability assessments benefit MSP clients\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How vulnerability assessments benefit MSP clients","description":"Vulnerability assessments are a great tool for improving clients' security posture and adding value to your cybersecurity offering.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/","og_locale":"en_US","og_type":"article","og_title":"How vulnerability assessments benefit MSP clients","og_description":"Vulnerability assessments are a great tool for improving clients' security posture and adding value to your cybersecurity offering.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2024-11-29T15:53:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/security-assessment-1200x630.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"How vulnerability assessments benefit MSP clients","datePublished":"2024-11-29T15:53:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/"},"wordCount":1014,"commentCount":3,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/security-assessment-1200x480.png","keywords":["Office Protect","Cybersecurity","Managed Service Providers (MSPs)"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/","url":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/","name":"How vulnerability assessments benefit MSP clients","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/security-assessment-1200x480.png","datePublished":"2024-11-29T15:53:02+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Vulnerability assessments are a great tool for improving clients' security posture and adding value to your cybersecurity offering.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/#primaryimage","url":"\/blog\/wp-content\/uploads\/security-assessment-1200x480.png","contentUrl":"\/blog\/wp-content\/uploads\/security-assessment-1200x480.png","width":1200,"height":460,"caption":"Vulnerability assessment"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/vulnerability-assessments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How vulnerability assessments benefit MSP clients"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Office Protect","Cybersecurity","Managed Service Providers (MSPs)"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/20308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=20308"}],"version-history":[{"count":11,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/20308\/revisions"}],"predecessor-version":[{"id":25163,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/20308\/revisions\/25163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/20314"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=20308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=20308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=20308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}